summaryrefslogtreecommitdiffstats
path: root/base/common/src/com/netscape/cms/publish
diff options
context:
space:
mode:
authorEndi Sukma Dewata <edewata@redhat.com>2012-04-05 14:49:11 -0500
committerEndi Sukma Dewata <edewata@redhat.com>2012-04-09 10:03:25 -0500
commit7c7b9d023cd466c1771068badc020dab36beb553 (patch)
tree178877eb83e25336be7577953945fbdb0b9e1a15 /base/common/src/com/netscape/cms/publish
parentda1e6e2f49f66fd46c8039ff1aa4386309fba8f4 (diff)
downloadpki-7c7b9d023cd466c1771068badc020dab36beb553.tar.gz
pki-7c7b9d023cd466c1771068badc020dab36beb553.tar.xz
pki-7c7b9d023cd466c1771068badc020dab36beb553.zip
Removed whitespaces from Java code.
Whitespaces in Java code have been removed with the following command: find . -not -path .git -name *.java -exec sed -i 's/[[:blank:]]\+$//' {} \; Ticket #134
Diffstat (limited to 'base/common/src/com/netscape/cms/publish')
-rw-r--r--base/common/src/com/netscape/cms/publish/mappers/AVAPattern.java32
-rw-r--r--base/common/src/com/netscape/cms/publish/mappers/LdapCaSimpleMap.java10
-rw-r--r--base/common/src/com/netscape/cms/publish/mappers/LdapCertCompsMap.java8
-rw-r--r--base/common/src/com/netscape/cms/publish/mappers/LdapCertExactMap.java8
-rw-r--r--base/common/src/com/netscape/cms/publish/mappers/LdapCertSubjMap.java12
-rw-r--r--base/common/src/com/netscape/cms/publish/mappers/LdapCrlIssuerCompsMap.java8
-rw-r--r--base/common/src/com/netscape/cms/publish/mappers/LdapDNCompsMap.java18
-rw-r--r--base/common/src/com/netscape/cms/publish/mappers/LdapEnhancedMap.java12
-rw-r--r--base/common/src/com/netscape/cms/publish/mappers/LdapSimpleMap.java12
-rw-r--r--base/common/src/com/netscape/cms/publish/mappers/MapAVAPattern.java62
-rw-r--r--base/common/src/com/netscape/cms/publish/mappers/MapDNPattern.java30
-rw-r--r--base/common/src/com/netscape/cms/publish/mappers/MapRDNPattern.java32
-rw-r--r--base/common/src/com/netscape/cms/publish/mappers/NoMap.java4
-rw-r--r--base/common/src/com/netscape/cms/publish/publishers/FileBasedPublisher.java8
-rw-r--r--base/common/src/com/netscape/cms/publish/publishers/LdapCaCertPublisher.java4
-rw-r--r--base/common/src/com/netscape/cms/publish/publishers/LdapCertSubjPublisher.java6
-rw-r--r--base/common/src/com/netscape/cms/publish/publishers/LdapCertificatePairPublisher.java6
-rw-r--r--base/common/src/com/netscape/cms/publish/publishers/LdapCrlPublisher.java2
-rw-r--r--base/common/src/com/netscape/cms/publish/publishers/LdapEncryptCertPublisher.java6
-rw-r--r--base/common/src/com/netscape/cms/publish/publishers/LdapUserCertPublisher.java6
-rw-r--r--base/common/src/com/netscape/cms/publish/publishers/PublisherUtils.java4
21 files changed, 145 insertions, 145 deletions
diff --git a/base/common/src/com/netscape/cms/publish/mappers/AVAPattern.java b/base/common/src/com/netscape/cms/publish/mappers/AVAPattern.java
index 7f70722d0..acac975cb 100644
--- a/base/common/src/com/netscape/cms/publish/mappers/AVAPattern.java
+++ b/base/common/src/com/netscape/cms/publish/mappers/AVAPattern.java
@@ -57,16 +57,16 @@ import com.netscape.certsrv.request.IRequest;
* attribute formulated from the certificate
* subject name, extension or request attributes.
* <p>
- *
+ *
* The syntax is
- *
+ *
* <pre>
- * avaPattern := constant-value |
- * "$subj" "." attrName [ "." attrNumber ] |
- * "$req" "." [ prefix .] attrName [ "." attrNumber ] |
+ * avaPattern := constant-value |
+ * "$subj" "." attrName [ "." attrNumber ] |
+ * "$req" "." [ prefix .] attrName [ "." attrNumber ] |
* "$ext" "." extName [ "." nameType ] [ "." attrNumber ]
* </pre>
- *
+ *
* <pre>
* Example: <i>$ext.SubjectAlternativeName.RFC822Name.1</i>
* cert subjectAltName is rfc822Name: jjames@mcom.com
@@ -77,9 +77,9 @@ import com.netscape.certsrv.request.IRequest;
* The first rfc822name value in the subjAltName extension. <br>
* <p>
* </pre>
- *
+ *
* If a request attribute or subject DN component does not exist, the attribute is skipped.
- *
+ *
* @version $Revision$, $Date$
*/
class AVAPattern {
@@ -117,12 +117,12 @@ class AVAPattern {
/* value type */
protected String mType = null;
- /* value - could be name of a request attribute or
+ /* value - could be name of a request attribute or
* cert subject attribute or extension name.
*/
protected String mValue = null;
- /* value type - general name type of an
+ /* value type - general name type of an
* extension attribute if any.
*/
protected String mGNType = null;
@@ -174,7 +174,7 @@ class AVAPattern {
}
if (c == '$') {
- // check for $subj $ext or $req
+ // check for $subj $ext or $req
try {
c = in.read();
} catch (IOException e) {
@@ -252,7 +252,7 @@ class AVAPattern {
}
if (c == '+' || c == ',') { // either ',' or '+'
- in.unread(c); // pushback last , or +
+ in.unread(c); // pushback last , or +
}
} catch (IOException e) {
throw new ELdapException(
@@ -350,7 +350,7 @@ class AVAPattern {
// value is constant. treat as regular ava.
mType = TYPE_CONSTANT;
- // parse ava value.
+ // parse ava value.
StringBuffer valueBuf = new StringBuffer();
valueBuf.append((char) c);
@@ -362,7 +362,7 @@ class AVAPattern {
}
if (c == '+' || c == ',') { // either ',' or '+'
- in.unread(c); // pushback last , or +
+ in.unread(c); // pushback last , or +
}
} catch (IOException e) {
throw new ELdapException(
@@ -371,9 +371,9 @@ class AVAPattern {
mValue = valueBuf.toString().trim();
- /* try {
+ /* try {
* AVA ava = mLdapDNStrConverter.parseAVA(
- * valueBuf.toString());
+ * valueBuf.toString());
* mValue = ava.toLdapDNString();
* //System.out.println("----- mValue "+mValue);
* } catch (IOException e) {
diff --git a/base/common/src/com/netscape/cms/publish/mappers/LdapCaSimpleMap.java b/base/common/src/com/netscape/cms/publish/mappers/LdapCaSimpleMap.java
index bbf641540..a1a65a342 100644
--- a/base/common/src/com/netscape/cms/publish/mappers/LdapCaSimpleMap.java
+++ b/base/common/src/com/netscape/cms/publish/mappers/LdapCaSimpleMap.java
@@ -54,7 +54,7 @@ import com.netscape.certsrv.request.IRequest;
* in the directory to publish the cert or crl.
* The restriction of this mapper is that the ldap dn components must
* be part of certificate subject name or request attributes or constant.
- *
+ *
* @version $Revision$, $Date$
*/
public class LdapCaSimpleMap implements ILdapMapper, IExtendedPluginInfo {
@@ -82,7 +82,7 @@ public class LdapCaSimpleMap implements ILdapMapper, IExtendedPluginInfo {
/**
* Constructor.
- *
+ *
* @param dnPattern The base DN.
*/
public LdapCaSimpleMap(String dnPattern) {
@@ -157,7 +157,7 @@ public class LdapCaSimpleMap implements ILdapMapper, IExtendedPluginInfo {
/**
* Maps a X500 subject name to LDAP entry.
* Uses DN pattern to form a DN for a LDAP base search.
- *
+ *
* @param conn the LDAP connection.
* @param obj the object to map.
* @exception ELdapException if any LDAP exceptions occured.
@@ -170,7 +170,7 @@ public class LdapCaSimpleMap implements ILdapMapper, IExtendedPluginInfo {
/**
* Maps a X500 subject name to LDAP entry.
* Uses DN pattern to form a DN for a LDAP base search.
- *
+ *
* @param conn the LDAP connection.
* @param req the request to map.
* @param obj the object to map.
@@ -277,7 +277,7 @@ public class LdapCaSimpleMap implements ILdapMapper, IExtendedPluginInfo {
/**
* form a dn from component in the request and cert subject name
- *
+ *
* @param req The request
* @param obj The certificate or crl
*/
diff --git a/base/common/src/com/netscape/cms/publish/mappers/LdapCertCompsMap.java b/base/common/src/com/netscape/cms/publish/mappers/LdapCertCompsMap.java
index 2373e3c66..d1a734b82 100644
--- a/base/common/src/com/netscape/cms/publish/mappers/LdapCertCompsMap.java
+++ b/base/common/src/com/netscape/cms/publish/mappers/LdapCertCompsMap.java
@@ -43,7 +43,7 @@ import com.netscape.certsrv.request.IRequest;
* If the baseDN is null and none of the DN comps matched, it is an error.
* If none of the DN comps and filter comps matched, it is an error.
* If just the filter comps is null, a base search is performed.
- *
+ *
* @version $Revision$, $Date$
*/
public class LdapCertCompsMap
@@ -57,14 +57,14 @@ public class LdapCertCompsMap
/**
* Constructor.
- *
+ *
* The DN comps are used to form a LDAP entry to begin a subtree search.
* The filter comps are used to form a search filter for the subtree.
* If none of the DN comps matched, baseDN is used for the subtree.
* If the baseDN is null and none of the DN comps matched, it is an error.
* If none of the DN comps and filter comps matched, it is an error.
* If just the filter comps is null, a base search is performed.
- *
+ *
* @param baseDN The base DN.
* @param dnComps Components to form the LDAP base dn for search.
* @param filterComps Components to form the LDAP search filter.
@@ -116,7 +116,7 @@ public class LdapCertCompsMap
* If the formed DN is null and baseDN is null an error is thrown.
* If the filter is null a base search is performed.
* If both are null an error is thrown.
- *
+ *
* @param conn - the LDAP connection.
* @param obj - the X509Certificate.
*/
diff --git a/base/common/src/com/netscape/cms/publish/mappers/LdapCertExactMap.java b/base/common/src/com/netscape/cms/publish/mappers/LdapCertExactMap.java
index 11b53a797..5c085481d 100644
--- a/base/common/src/com/netscape/cms/publish/mappers/LdapCertExactMap.java
+++ b/base/common/src/com/netscape/cms/publish/mappers/LdapCertExactMap.java
@@ -43,7 +43,7 @@ import com.netscape.certsrv.request.IRequest;
/**
* Maps a X509 certificate to a LDAP entry by using the subject name
* of the certificate as the LDAP entry DN.
- *
+ *
* @version $Revision$, $Date$
*/
public class LdapCertExactMap implements ILdapMapper, IExtendedPluginInfo {
@@ -103,7 +103,7 @@ public class LdapCertExactMap implements ILdapMapper, IExtendedPluginInfo {
/**
* Finds the entry for the certificate by looking for the cert
* subject name in the subject name attribute.
- *
+ *
* @param conn - the LDAP connection.
* @param obj - the X509Certificate.
*/
@@ -172,13 +172,13 @@ public class LdapCertExactMap implements ILdapMapper, IExtendedPluginInfo {
/*
catch (IOException e) {
- log(ILogger.LL_FAILURE,
+ log(ILogger.LL_FAILURE,
CMS.getLogMessage("PUBLISH_CANT_GET_SUBJECT", e.toString()));
throw new ELdapException(
LdapResources.GET_CERT_SUBJECT_DN_FAILED, e);
}
catch (CertificateEncodingException e) {
- log(ILogger.LL_FAILURE,
+ log(ILogger.LL_FAILURE,
CMS.getLogMessage("PUBLISH_CANT_DECODE_CERT", e.toString()));
throw new ELdapException(
LdapResources.GET_DER_ENCODED_CERT_FAILED, e);
diff --git a/base/common/src/com/netscape/cms/publish/mappers/LdapCertSubjMap.java b/base/common/src/com/netscape/cms/publish/mappers/LdapCertSubjMap.java
index 4d5ff38c8..61ffef947 100644
--- a/base/common/src/com/netscape/cms/publish/mappers/LdapCertSubjMap.java
+++ b/base/common/src/com/netscape/cms/publish/mappers/LdapCertSubjMap.java
@@ -43,7 +43,7 @@ import com.netscape.certsrv.request.IRequest;
/**
* Maps a X509 certificate to a LDAP entry by finding an LDAP entry
* which has an attribute whose contents are equal to the cert subject name.
- *
+ *
* @version $Revision$, $Date$
*/
public class LdapCertSubjMap implements ILdapMapper, IExtendedPluginInfo {
@@ -62,7 +62,7 @@ public class LdapCertSubjMap implements ILdapMapper, IExtendedPluginInfo {
/**
* constructs a certificate subject name mapper with search base.
- *
+ *
* @param searchBase the dn to start searching for the certificate
* subject name.
*/
@@ -76,7 +76,7 @@ public class LdapCertSubjMap implements ILdapMapper, IExtendedPluginInfo {
/**
* Constructor using non-ES cert map attribute name.
- *
+ *
* @param searchBase entry to start search.
* @param certSubjNameAttr attribute for certificate subject names.
* @param certAttr attribute to find certificate.
@@ -172,7 +172,7 @@ public class LdapCertSubjMap implements ILdapMapper, IExtendedPluginInfo {
/**
* Finds the entry for the certificate by looking for the cert
* subject name in the subject name attribute.
- *
+ *
* @param conn - the LDAP connection.
* @param obj - the X509Certificate.
*/
@@ -242,13 +242,13 @@ public class LdapCertSubjMap implements ILdapMapper, IExtendedPluginInfo {
/*
catch (IOException e) {
- log(ILogger.LL_FAILURE,
+ log(ILogger.LL_FAILURE,
CMS.getLogMessage("PUBLISH_CANT_GET_SUBJECT", e.toString()));
throw new ELdapException(
LdapResources.GET_CERT_SUBJECT_DN_FAILED, e);
}
catch (CertificateEncodingException e) {
- log(ILogger.LL_FAILURE,
+ log(ILogger.LL_FAILURE,
CMS.getLogMessage("PUBLISH_CANT_DECODE_CERT", e.toString()));
throw new ELdapException(
LdapResources.GET_DER_ENCODED_CERT_FAILED, e);
diff --git a/base/common/src/com/netscape/cms/publish/mappers/LdapCrlIssuerCompsMap.java b/base/common/src/com/netscape/cms/publish/mappers/LdapCrlIssuerCompsMap.java
index 654de5d30..7c4c3c4b0 100644
--- a/base/common/src/com/netscape/cms/publish/mappers/LdapCrlIssuerCompsMap.java
+++ b/base/common/src/com/netscape/cms/publish/mappers/LdapCrlIssuerCompsMap.java
@@ -35,7 +35,7 @@ import com.netscape.certsrv.request.IRequest;
* Default crl mapper.
* maps the crl to a ldap entry by using components in the issuer name
* to find the CA's entry.
- *
+ *
* @version $Revision$, $Date$
*/
public class LdapCrlIssuerCompsMap
@@ -49,14 +49,14 @@ public class LdapCrlIssuerCompsMap
/**
* Constructor.
- *
+ *
* The DN comps are used to form a LDAP entry to begin a subtree search.
* The filter comps are used to form a search filter for the subtree.
* If none of the DN comps matched, baseDN is used for the subtree.
* If the baseDN is null and none of the DN comps matched, it is an error.
* If none of the DN comps and filter comps matched, it is an error.
* If just the filter comps is null, a base search is performed.
- *
+ *
* @param baseDN The base DN.
* @param dnComps Components to form the LDAP base dn for search.
* @param filterComps Components to form the LDAP search filter.
@@ -110,7 +110,7 @@ public class LdapCrlIssuerCompsMap
* If the formed DN is null and baseDN is null an error is thrown.
* If the filter is null a base search is performed.
* If both are null an error is thrown.
- *
+ *
* @param conn - the LDAP connection.
* @param obj - the X509Certificate.
* @return the result. LdapCertMapResult is also used for CRL.
diff --git a/base/common/src/com/netscape/cms/publish/mappers/LdapDNCompsMap.java b/base/common/src/com/netscape/cms/publish/mappers/LdapDNCompsMap.java
index 73549f1b5..1f7f06f69 100644
--- a/base/common/src/com/netscape/cms/publish/mappers/LdapDNCompsMap.java
+++ b/base/common/src/com/netscape/cms/publish/mappers/LdapDNCompsMap.java
@@ -55,7 +55,7 @@ import com.netscape.certsrv.publish.ILdapPlugin;
* If the baseDN is null and none of the DN comps matched, it is an error.
* If none of the DN comps and filter comps matched, it is an error.
* If just the filter comps is null, a base search is performed.
- *
+ *
* @version $Revision$, $Date$
*/
public class LdapDNCompsMap
@@ -71,14 +71,14 @@ public class LdapDNCompsMap
/**
* Constructor.
- *
+ *
* The DN comps are used to form a LDAP entry to begin a subtree search.
* The filter comps are used to form a search filter for the subtree.
* If none of the DN comps matched, baseDN is used for the subtree.
* If the baseDN is null and none of the DN comps matched, it is an error.
* If none of the DN comps and filter comps matched, it is an error.
* If just the filter comps is null, a base search is performed.
- *
+ *
* @param baseDN The base DN.
* @param dnComps Components to form the LDAP base dn for search.
* @param filterComps Components to form the LDAP search filter.
@@ -209,7 +209,7 @@ public class LdapDNCompsMap
* If the formed DN is null and baseDN is null an error is thrown.
* If the filter is null a base search is performed.
* If both are null an error is thrown.
- *
+ *
* @param conn the LDAP connection.
* @param x500name the dn to map.
* @param obj the object
@@ -234,8 +234,8 @@ public class LdapDNCompsMap
// if (filter == null) {
// log(ILogger.LL_FAILURE, "No dn and filter formed");
// throw new ELdapException(
- // LdapResources.NO_DN_AND_FILTER_COMPS,
- // x500name.toString());
+ // LdapResources.NO_DN_AND_FILTER_COMPS,
+ // x500name.toString());
// }
if (mBaseDN == null) {
log(ILogger.LL_FAILURE,
@@ -302,7 +302,7 @@ public class LdapDNCompsMap
/**
* form a dn and filter from component in the cert subject name
- *
+ *
* @param subjName subject name
*/
public String[] formDNandFilter(X500Name subjName)
@@ -359,7 +359,7 @@ public class LdapDNCompsMap
}
}
- // XXX should be an error when string is null?
+ // XXX should be an error when string is null?
// return to caller to decide.
if (dnRdns.size() != 0) {
dnStr = new X500Name(dnRdns).toLdapDNString();
@@ -417,7 +417,7 @@ public class LdapDNCompsMap
* arrays of objectidentifiers.
* The string is expected to be comma separated AVA attribute names.
* For example, "uid,cn,o,ou". Attribute names are case insensitive.
- *
+ *
* @param val the string specifying the comps
* @exception ELdapException if any error occurs.
*/
diff --git a/base/common/src/com/netscape/cms/publish/mappers/LdapEnhancedMap.java b/base/common/src/com/netscape/cms/publish/mappers/LdapEnhancedMap.java
index c9a7f867c..d94032071 100644
--- a/base/common/src/com/netscape/cms/publish/mappers/LdapEnhancedMap.java
+++ b/base/common/src/com/netscape/cms/publish/mappers/LdapEnhancedMap.java
@@ -72,7 +72,7 @@ import com.netscape.certsrv.request.IRequest;
* entry is not found, it has the option to create
* the ldap entry given the dn and attributes
* formulated.
- *
+ *
* @version $Revision$, $Date$
*/
public class LdapEnhancedMap
@@ -105,7 +105,7 @@ public class LdapEnhancedMap
/* mapper plug-in fields */
protected static final String PROP_DNPATTERN = "dnPattern";
protected static final String PROP_CREATE = "createEntry";
- // the object class of the entry to be created. xxxx not done yet
+ // the object class of the entry to be created. xxxx not done yet
protected static final String PROP_OBJCLASS = "objectClass";
// req/cert/ext attribute --> directory attribute table
protected static final String PROP_ATTRNUM = "attrNum";
@@ -206,7 +206,7 @@ public class LdapEnhancedMap
/**
* form a dn from component in the request and cert subject name
- *
+ *
* @param req The request
* @param obj The certificate or crl
*/
@@ -332,7 +332,7 @@ public class LdapEnhancedMap
/**
* for initializing from config store.
- *
+ *
* implementation for extended
* ILdapPlugin interface method
*/
@@ -439,7 +439,7 @@ public class LdapEnhancedMap
/**
* Maps an X500 subject name to an LDAP entry.
* Uses DN pattern to form a DN for an LDAP base search.
- *
+ *
* @param conn the LDAP connection.
* @param obj the object to map.
* @exception ELdapException if any LDAP exceptions occurred.
@@ -452,7 +452,7 @@ public class LdapEnhancedMap
/**
* Maps an X500 subject name to an LDAP entry.
* Uses DN pattern to form a DN for an LDAP base search.
- *
+ *
* @param conn the LDAP connection.
* @param req the request to map.
* @param obj the object to map.
diff --git a/base/common/src/com/netscape/cms/publish/mappers/LdapSimpleMap.java b/base/common/src/com/netscape/cms/publish/mappers/LdapSimpleMap.java
index 642729673..67d98f4cc 100644
--- a/base/common/src/com/netscape/cms/publish/mappers/LdapSimpleMap.java
+++ b/base/common/src/com/netscape/cms/publish/mappers/LdapSimpleMap.java
@@ -51,7 +51,7 @@ import com.netscape.certsrv.request.IRequest;
* in the directory to publish the cert or crl.
* The restriction of this mapper is that the ldap dn components must
* be part of certificate subject name or request attributes or constant.
- *
+ *
* @version $Revision$, $Date$
*/
public class LdapSimpleMap implements ILdapMapper, IExtendedPluginInfo {
@@ -77,7 +77,7 @@ public class LdapSimpleMap implements ILdapMapper, IExtendedPluginInfo {
/**
* Constructor.
- *
+ *
* @param dnPattern The base DN.
*/
public LdapSimpleMap(String dnPattern) {
@@ -151,7 +151,7 @@ public class LdapSimpleMap implements ILdapMapper, IExtendedPluginInfo {
/**
* Maps a X500 subject name to LDAP entry.
* Uses DN pattern to form a DN for a LDAP base search.
- *
+ *
* @param conn the LDAP connection.
* @param obj the object to map.
* @exception ELdapException if any LDAP exceptions occured.
@@ -164,7 +164,7 @@ public class LdapSimpleMap implements ILdapMapper, IExtendedPluginInfo {
/**
* Maps a X500 subject name to LDAP entry.
* Uses DN pattern to form a DN for a LDAP base search.
- *
+ *
* @param conn the LDAP connection.
* @param req the request to map.
* @param obj the object to map.
@@ -201,7 +201,7 @@ public class LdapSimpleMap implements ILdapMapper, IExtendedPluginInfo {
LDAPEntry entry = results.next();
if (results.hasMoreElements()) {
- log(ILogger.LL_FAILURE, CMS.getLogMessage("PUBLISH_MORE_THAN_ONE_ENTRY", dn, ((req == null) ? "" :
+ log(ILogger.LL_FAILURE, CMS.getLogMessage("PUBLISH_MORE_THAN_ONE_ENTRY", dn, ((req == null) ? "" :
req.getRequestId().toString())));
throw new ELdapException(CMS.getUserMessage("CMS_LDAP_MORE_THAN_ONE_ENTRY",
((req == null) ? "" : req.getRequestId().toString())));
@@ -237,7 +237,7 @@ public class LdapSimpleMap implements ILdapMapper, IExtendedPluginInfo {
/**
* form a dn from component in the request and cert subject name
- *
+ *
* @param req The request
* @param obj The certificate or crl
*/
diff --git a/base/common/src/com/netscape/cms/publish/mappers/MapAVAPattern.java b/base/common/src/com/netscape/cms/publish/mappers/MapAVAPattern.java
index 7aeb672d0..ef7fa9d13 100644
--- a/base/common/src/com/netscape/cms/publish/mappers/MapAVAPattern.java
+++ b/base/common/src/com/netscape/cms/publish/mappers/MapAVAPattern.java
@@ -45,41 +45,41 @@ import com.netscape.certsrv.request.IRequest;
* class for parsing a DN pattern used to construct a ldap dn from
* request attributes and cert subject name.
* <p>
- *
+ *
* dnpattern is a string representing a ldap dn pattern to formulate from the certificate subject name attributes and
* request attributes . If empty or not set, the certificate subject name will be used as the ldap dn.
* <p>
- *
+ *
* The syntax is
- *
+ *
* <pre>
* dnPattern := rdnPattern *[ "," rdnPattern ]
* rdnPattern := avaPattern *[ "+" avaPattern ]
- * avaPattern := name "=" value |
- * name "=" "$subj" "." attrName [ "." attrNumber ] |
- * name "=" "$ext" "." extName [ "." nameType ] [ "." attrNumber ]
- * name "=" "$req" "." attrName [ "." attrNumber ] |
+ * avaPattern := name "=" value |
+ * name "=" "$subj" "." attrName [ "." attrNumber ] |
+ * name "=" "$ext" "." extName [ "." nameType ] [ "." attrNumber ]
+ * name "=" "$req" "." attrName [ "." attrNumber ] |
* "$rdn" "." number
* </pre>
- *
+ *
* <pre>
* Example1: <i>cn=Certificate Manager,ou=people,o=mcom.com</i>
* cert subject name: dn: CN=Certificate Manager, OU=people, O=mcom.com
- * request attributes: uid: cmanager
+ * request attributes: uid: cmanager
* <p>
* The dn formulated will be : <br>
* CN=Certificate Manager, OU=people, O=mcom.com
* <p>
* note: Subordinate ca enrollment will use ca mapper. Use predicate
* to distinguish the ca itself and the subordinates.
- *
+ *
* Example2: <i>UID=$req.HTTP_PARAMS.uid, OU=$subj.ou, OU=people, , O=mcom.com</i>
* cert subject name: dn: UID=jjames, OU=IS, OU=people, , O=mcom.com
- * request attributes: uid: cmanager
+ * request attributes: uid: cmanager
* <p>
* The dn formulated will be : <br>
* UID=jjames, OU=IS, OU=people, O=mcom.com
- * <p>
+ * <p>
* UID = the 'uid' attribute value in the request. <br>
* OU = the 'ou' value in the cert subject name. <br>
* O = the string mcom.com. <br>
@@ -87,20 +87,20 @@ import com.netscape.certsrv.request.IRequest;
* Example3: <i>UID=$req.HTTP_PARAMS.uid, E=$ext.SubjectAlternativeName.RFC822Name.1, O=mcom.com</i>
* cert subject name: dn: UID=jjames, OU=IS, OU=people, O=mcom.com
* cert subjectAltName is rfc822Name: jjames@mcom.com
- * request attributes: uid: cmanager
+ * request attributes: uid: cmanager
* <p>
* The dn formulated will be : <br>
* UID=jjames, E=jjames@mcom.com, O=mcom.com
- * <p>
+ * <p>
* UID = the 'uid' attribute value in the request. <br>
* E = The first rfc822name value in the subjAltName extension. <br>
* O = the string mcom.com. <br>
* <p>
* </pre>
- *
+ *
* If an request attribute or subject DN component does not exist, the attribute is skipped. There is potential risk
* that a wrong dn will be mapped into.
- *
+ *
* @version $Revision$, $Date$
*/
class MapAVAPattern {
@@ -138,7 +138,7 @@ class MapAVAPattern {
/* the attribute in the AVA pair */
protected String mAttr = null;
- /* value - could be name of a request attribute or
+ /* value - could be name of a request attribute or
* cert subject dn attribute. */
protected String mValue = null;
@@ -185,7 +185,7 @@ class MapAVAPattern {
if (c == -1)
throw new ECompSyntaxErr(CMS.getUserMessage("CMS_AUTHENTICATION_COMPONENT_SYNTAX", "All blank"));
- // $rdn "." number syntax.
+ // $rdn "." number syntax.
if (c == '$') {
//System.out.println("$rdn syntax");
@@ -230,9 +230,9 @@ class MapAVAPattern {
return;
}
- // name "=" ... syntax.
+ // name "=" ... syntax.
- // read name
+ // read name
//System.out.println("reading name");
StringBuffer attrBuf = new StringBuffer();
@@ -253,10 +253,10 @@ class MapAVAPattern {
throw new ECompSyntaxErr(CMS.getUserMessage("CMS_AUTHENTICATION_COMPONENT_SYNTAX",
"Missing \"=\" in ava pattern"));
- // read value
+ // read value
//System.out.println("reading value");
- // skip spaces
+ // skip spaces
//System.out.println("skip spaces for value");
try {
while ((c = in.read()) == ' ' || c == '\t') {//System.out.println("spaces2 read "+(char)c);
@@ -271,7 +271,7 @@ class MapAVAPattern {
"no value after = in ava pattern"));
if (c == '$') {
- // check for $subj $ext or $req
+ // check for $subj $ext or $req
try {
c = in.read();
//System.out.println("check $dn or $attr read "+(char)c);
@@ -327,7 +327,7 @@ class MapAVAPattern {
"unknown keyword. expecting $subj $ext or $req."));
}
- // get request attr name of subject dn pattern from above.
+ // get request attr name of subject dn pattern from above.
String attrName = attrBuf.toString().trim();
//System.out.println("----- attrName "+attrName);
@@ -337,10 +337,10 @@ class MapAVAPattern {
mAttr = attrName;
/*
- try {
- ObjectIdentifier attrOid =
- mLdapDNStrConverter.parseAVAKeyword(attrName);
- mAttr = mLdapDNStrConverter.encodeOID(attrOid);
+ try {
+ ObjectIdentifier attrOid =
+ mLdapDNStrConverter.parseAVAKeyword(attrName);
+ mAttr = mLdapDNStrConverter.encodeOID(attrOid);
//System.out.println("----- mAttr "+mAttr);
}
catch (IOException e) {
@@ -359,7 +359,7 @@ class MapAVAPattern {
valueBuf.append((char) c);
}
if (c == '+' || c == ',') // either ',' or '+'
- in.unread(c); // pushback last , or +
+ in.unread(c); // pushback last , or +
} catch (IOException e) {
throw new ELdapException(
CMS.getUserMessage("CMS_LDAP_INTERNAL_ERROR", e.toString()));
@@ -439,7 +439,7 @@ class MapAVAPattern {
// value is constant. treat as regular ava.
mType = TYPE_CONSTANT;
//System.out.println("----- mType constant");
- // parse ava value.
+ // parse ava value.
StringBuffer valueBuf = new StringBuffer();
valueBuf.append((char) c);
@@ -450,7 +450,7 @@ class MapAVAPattern {
valueBuf.append((char) c);
}
if (c == '+' || c == ',') { // either ',' or '+'
- in.unread(c); // pushback last , or +
+ in.unread(c); // pushback last , or +
}
} catch (IOException e) {
throw new ELdapException(
diff --git a/base/common/src/com/netscape/cms/publish/mappers/MapDNPattern.java b/base/common/src/com/netscape/cms/publish/mappers/MapDNPattern.java
index 7a9025b1d..dc446a7b7 100644
--- a/base/common/src/com/netscape/cms/publish/mappers/MapDNPattern.java
+++ b/base/common/src/com/netscape/cms/publish/mappers/MapDNPattern.java
@@ -34,49 +34,49 @@ import com.netscape.certsrv.request.IRequest;
* class for parsing a DN pattern used to construct a ldap dn from
* request attributes and cert subject name.
* <p>
- *
+ *
* dnpattern is a string representing a ldap dn pattern to formulate from the certificate subject name attributes and
* request attributes . If empty or not set, the certificate subject name will be used as the ldap dn.
* <p>
- *
+ *
* The syntax is
- *
+ *
* <pre>
* dnPattern := rdnPattern *[ "," rdnPattern ]
* rdnPattern := avaPattern *[ "+" avaPattern ]
- * avaPattern := name "=" value |
- * name "=" "$subj" "." attrName [ "." attrNumber ] |
- * name "=" "$req" "." attrName [ "." attrNumber ] |
+ * avaPattern := name "=" value |
+ * name "=" "$subj" "." attrName [ "." attrNumber ] |
+ * name "=" "$req" "." attrName [ "." attrNumber ] |
* "$rdn" "." number
* </pre>
- *
+ *
* <pre>
* Example1: <i>cn=Certificate Manager,ou=people,o=mcom.com</i>
* cert subject name: dn: CN=Certificate Manager, OU=people, O=mcom.com
- * request attributes: uid: cmanager
+ * request attributes: uid: cmanager
* <p>
* The dn formulated will be : <br>
* CN=Certificate Manager, OU=people, O=mcom.com
* <p>
* note: Subordinate ca enrollment will use ca mapper. Use predicate
* to distinguish the ca itself and the subordinates.
- *
+ *
* Example2: <i>UID=$req.HTTP_PARAMS.uid, OU=$subj.ou, O=people, , O=mcom.com</i>
* cert subject name: dn: UID=jjames, OU=IS, O=people, , O=mcom.com
- * request attributes: uid: cmanager
+ * request attributes: uid: cmanager
* <p>
* The dn formulated will be : <br>
* UID=jjames, OU=IS, OU=people, O=mcom.com
- * <p>
+ * <p>
* UID = the 'uid' attribute value in the request. <br>
* OU = the 'ou' value in the cert subject name. <br>
* O = the string people, mcom.com. <br>
* <p>
* </pre>
- *
+ *
* If an request attribute or subject DN component does not exist, the attribute is skipped. There is potential risk
* that a wrong dn will be mapped into.
- *
+ *
* @version $Revision$, $Date$
*/
public class MapDNPattern {
@@ -97,7 +97,7 @@ public class MapDNPattern {
/**
* Construct a DN pattern by parsing a pattern string.
- *
+ *
* @param pattern the DN pattern
* @exception EBaseException If parsing error occurs.
*/
@@ -166,7 +166,7 @@ public class MapDNPattern {
/**
* Form a Ldap v3 DN string from a request and a cert subject name.
- *
+ *
* @param req the request for (un)publish
* @param subject the subjectDN of the certificate
* @return Ldap v3 DN string to use for base ldap search.
diff --git a/base/common/src/com/netscape/cms/publish/mappers/MapRDNPattern.java b/base/common/src/com/netscape/cms/publish/mappers/MapRDNPattern.java
index c1688345b..61da1d7d2 100644
--- a/base/common/src/com/netscape/cms/publish/mappers/MapRDNPattern.java
+++ b/base/common/src/com/netscape/cms/publish/mappers/MapRDNPattern.java
@@ -33,49 +33,49 @@ import com.netscape.certsrv.request.IRequest;
* class for parsing a DN pattern used to construct a ldap dn from
* request attributes and cert subject name.
* <p>
- *
+ *
* dnpattern is a string representing a ldap dn pattern to formulate from the certificate subject name attributes and
* request attributes . If empty or not set, the certificate subject name will be used as the ldap dn.
* <p>
- *
+ *
* The syntax is
- *
+ *
* <pre>
* dnPattern := rdnPattern *[ "," rdnPattern ]
* rdnPattern := avaPattern *[ "+" avaPattern ]
- * avaPattern := name "=" value |
- * name "=" "$subj" "." attrName [ "." attrNumber ] |
- * name "=" "$req" "." attrName [ "." attrNumber ] |
+ * avaPattern := name "=" value |
+ * name "=" "$subj" "." attrName [ "." attrNumber ] |
+ * name "=" "$req" "." attrName [ "." attrNumber ] |
* "$rdn" "." number
* </pre>
- *
+ *
* <pre>
* Example1: <i>cn=Certificate Manager,ou=people,o=mcom.com</i>
* cert subject name: dn: CN=Certificate Manager, OU=people, O=mcom.com
- * request attributes: uid: cmanager
+ * request attributes: uid: cmanager
* <p>
* The dn formulated will be : <br>
* CN=Certificate Manager, OU=people, O=mcom.com
* <p>
* note: Subordinate ca enrollment will use ca mapper. Use predicate
* to distinguish the ca itself and the subordinates.
- *
+ *
* Example2: <i>UID=$req.HTTP_PARAMS.uid, OU=$subj.ou, O=people, , O=mcom.com</i>
* cert subject name: dn: UID=jjames, OU=IS, O=people, , O=mcom.com
- * request attributes: uid: cmanager
+ * request attributes: uid: cmanager
* <p>
* The dn formulated will be : <br>
* UID=jjames, OU=IS, OU=people, O=mcom.com
- * <p>
+ * <p>
* UID = the 'uid' attribute value in the request. <br>
* OU = the 'ou' value in the cert subject name. <br>
* O = the string people, mcom.com. <br>
* <p>
* </pre>
- *
+ *
* If an request attribute or subject DN component does not exist, the attribute is skipped.There is potential risk that
* a wrong dn will be mapped into.
- *
+ *
* @version $Revision$, $Date$
*/
class MapRDNPattern {
@@ -96,7 +96,7 @@ class MapRDNPattern {
/**
* Construct a DN pattern by parsing a pattern string.
- *
+ *
* @param pattenr the DN pattern
* @exception ELdapException If parsing error occurs.
*/
@@ -146,7 +146,7 @@ class MapRDNPattern {
if (lastChar != -1) {
try {
- in.unread(lastChar); // pushback last ,
+ in.unread(lastChar); // pushback last ,
} catch (IOException e) {
throw new ELdapException(
CMS.getUserMessage("CMS_LDAP_INTERNAL_ERROR", e.toString()));
@@ -183,7 +183,7 @@ class MapRDNPattern {
/**
* Form a Ldap v3 DN string from a request and a cert subject name.
- *
+ *
* @param req the request for (un)publish
* @param subject the subjectDN of the certificate
* @return Ldap v3 DN string to use for base ldap search.
diff --git a/base/common/src/com/netscape/cms/publish/mappers/NoMap.java b/base/common/src/com/netscape/cms/publish/mappers/NoMap.java
index 155c54ce0..cc12714e2 100644
--- a/base/common/src/com/netscape/cms/publish/mappers/NoMap.java
+++ b/base/common/src/com/netscape/cms/publish/mappers/NoMap.java
@@ -31,7 +31,7 @@ import com.netscape.certsrv.request.IRequest;
/**
* No Map
- *
+ *
* @version $Revision$, $Date$
*/
public class NoMap implements ILdapMapper, IExtendedPluginInfo {
@@ -68,7 +68,7 @@ public class NoMap implements ILdapMapper, IExtendedPluginInfo {
/**
* Maps a X500 subject name to LDAP entry.
* Uses DN pattern to form a DN for a LDAP base search.
- *
+ *
* @param conn the LDAP connection.
* @param obj the object to map.
* @exception ELdapException if any LDAP exceptions occured.
diff --git a/base/common/src/com/netscape/cms/publish/publishers/FileBasedPublisher.java b/base/common/src/com/netscape/cms/publish/publishers/FileBasedPublisher.java
index cb13b2452..c41025b54 100644
--- a/base/common/src/com/netscape/cms/publish/publishers/FileBasedPublisher.java
+++ b/base/common/src/com/netscape/cms/publish/publishers/FileBasedPublisher.java
@@ -50,7 +50,7 @@ import com.netscape.cmsutil.util.Utils;
/**
* This publisher writes certificate and CRL into
* a directory.
- *
+ *
* @version $Revision$, $Date$
*/
public class FileBasedPublisher implements ILdapPublisher, IExtendedPluginInfo {
@@ -257,7 +257,7 @@ public class FileBasedPublisher implements ILdapPublisher, IExtendedPluginInfo {
oldLink.delete();
}
File link = new File(linkName);
- if (link.exists()) { // current link becomes an old link
+ if (link.exists()) { // current link becomes an old link
link.renameTo(new File(linkName + ".old"));
}
File newLink = new File(linkName + ".new");
@@ -275,7 +275,7 @@ public class FileBasedPublisher implements ILdapPublisher, IExtendedPluginInfo {
/**
* Publishs a object to the ldap directory.
- *
+ *
* @param conn a Ldap connection
* (null if LDAP publishing is not enabled)
* @param dn dn of the ldap entry to publish cert
@@ -391,7 +391,7 @@ public class FileBasedPublisher implements ILdapPublisher, IExtendedPluginInfo {
/**
* Unpublishs a object to the ldap directory.
- *
+ *
* @param conn the Ldap connection
* (null if LDAP publishing is not enabled)
* @param dn dn of the ldap entry to unpublish cert
diff --git a/base/common/src/com/netscape/cms/publish/publishers/LdapCaCertPublisher.java b/base/common/src/com/netscape/cms/publish/publishers/LdapCaCertPublisher.java
index e47318b76..cbc77560f 100644
--- a/base/common/src/com/netscape/cms/publish/publishers/LdapCaCertPublisher.java
+++ b/base/common/src/com/netscape/cms/publish/publishers/LdapCaCertPublisher.java
@@ -43,7 +43,7 @@ import com.netscape.certsrv.publish.ILdapPublisher;
/**
* Interface for publishing a CA certificate to
- *
+ *
* @version $Revision$, $Date$
*/
public class LdapCaCertPublisher
@@ -152,7 +152,7 @@ public class LdapCaCertPublisher
* Adds the cert to the multi-valued certificate attribute as a
* DER encoded binary blob. Does not check if cert already exists.
* Converts the class to certificateAuthority.
- *
+ *
* @param conn the LDAP connection
* @param dn dn of the entry to publish the certificate
* @param certObj the certificate object.
diff --git a/base/common/src/com/netscape/cms/publish/publishers/LdapCertSubjPublisher.java b/base/common/src/com/netscape/cms/publish/publishers/LdapCertSubjPublisher.java
index 9000f6834..ac2b64973 100644
--- a/base/common/src/com/netscape/cms/publish/publishers/LdapCertSubjPublisher.java
+++ b/base/common/src/com/netscape/cms/publish/publishers/LdapCertSubjPublisher.java
@@ -47,7 +47,7 @@ import com.netscape.certsrv.publish.ILdapPublisher;
* Interface for mapping a X509 certificate to a LDAP entry
* Publishes a certificate as binary and its subject name.
* there is one subject name value for each certificate.
- *
+ *
* @version $Revision$, $Date$
*/
public class LdapCertSubjPublisher implements ILdapPublisher {
@@ -136,7 +136,7 @@ public class LdapCertSubjPublisher implements ILdapPublisher {
* Adds the cert to the multi-valued certificate attribute as a
* DER encoded binary blob. Does not check if cert already exists.
* Then adds the subject name of the cert to the subject name attribute.
- *
+ *
* @param conn the LDAP connection
* @param dn dn of the entry to publish the certificate
* @param certObj the certificate object.
@@ -298,7 +298,7 @@ public class LdapCertSubjPublisher implements ILdapPublisher {
return;
}
- // delete cert if there.
+ // delete cert if there.
LDAPModificationSet modSet = new LDAPModificationSet();
if (hasCert) {
diff --git a/base/common/src/com/netscape/cms/publish/publishers/LdapCertificatePairPublisher.java b/base/common/src/com/netscape/cms/publish/publishers/LdapCertificatePairPublisher.java
index c65ff79d5..014cc0e5e 100644
--- a/base/common/src/com/netscape/cms/publish/publishers/LdapCertificatePairPublisher.java
+++ b/base/common/src/com/netscape/cms/publish/publishers/LdapCertificatePairPublisher.java
@@ -41,7 +41,7 @@ import com.netscape.certsrv.publish.ILdapPublisher;
/**
* module for publishing a cross certificate pair to ldap
* crossCertificatePair attribute
- *
+ *
* @version $Revision$, $Date$
*/
public class LdapCertificatePairPublisher
@@ -153,7 +153,7 @@ public class LdapCertificatePairPublisher
/**
* publish a certificatePair
* -should not be called from listeners.
- *
+ *
* @param conn the LDAP connection
* @param dn dn of the entry to publish the XcertificatePair
* @param pair the Xcertificate bytes object.
@@ -166,7 +166,7 @@ public class LdapCertificatePairPublisher
/**
* publish a certificatePair
* -should not be called from listeners.
- *
+ *
* @param conn the LDAP connection
* @param dn dn of the entry to publish the XcertificatePair
* @param pair the cross cert bytes
diff --git a/base/common/src/com/netscape/cms/publish/publishers/LdapCrlPublisher.java b/base/common/src/com/netscape/cms/publish/publishers/LdapCrlPublisher.java
index 6826cc801..51bebe236 100644
--- a/base/common/src/com/netscape/cms/publish/publishers/LdapCrlPublisher.java
+++ b/base/common/src/com/netscape/cms/publish/publishers/LdapCrlPublisher.java
@@ -44,7 +44,7 @@ import com.netscape.certsrv.publish.ILdapPublisher;
/**
* For publishing master or global CRL.
* Publishes (replaces) the CRL in the CA's LDAP entry.
- *
+ *
* @version $Revision$, $Date$
*/
public class LdapCrlPublisher implements ILdapPublisher, IExtendedPluginInfo {
diff --git a/base/common/src/com/netscape/cms/publish/publishers/LdapEncryptCertPublisher.java b/base/common/src/com/netscape/cms/publish/publishers/LdapEncryptCertPublisher.java
index d2c488620..8dada61fb 100644
--- a/base/common/src/com/netscape/cms/publish/publishers/LdapEncryptCertPublisher.java
+++ b/base/common/src/com/netscape/cms/publish/publishers/LdapEncryptCertPublisher.java
@@ -52,7 +52,7 @@ import com.netscape.certsrv.publish.ILdapPublisher;
/**
* Interface for mapping a X509 certificate to a LDAP entry
- *
+ *
* @version $Revision$, $Date$
*/
public class LdapEncryptCertPublisher implements ILdapPublisher, IExtendedPluginInfo {
@@ -125,7 +125,7 @@ public class LdapEncryptCertPublisher implements ILdapPublisher, IExtendedPlugin
* publish a user certificate
* Adds the cert to the multi-valued certificate attribute as a
* DER encoded binary blob. Does not check if cert already exists.
- *
+ *
* @param conn the LDAP connection
* @param dn dn of the entry to publish the certificate
* @param certObj the certificate object.
@@ -155,7 +155,7 @@ public class LdapEncryptCertPublisher implements ILdapPublisher, IExtendedPlugin
return;
}
- // publish
+ // publish
LDAPModification mod = new LDAPModification(LDAPModification.REPLACE, attr);
conn.modify(dn, mod);
diff --git a/base/common/src/com/netscape/cms/publish/publishers/LdapUserCertPublisher.java b/base/common/src/com/netscape/cms/publish/publishers/LdapUserCertPublisher.java
index e31ce674c..020c25552 100644
--- a/base/common/src/com/netscape/cms/publish/publishers/LdapUserCertPublisher.java
+++ b/base/common/src/com/netscape/cms/publish/publishers/LdapUserCertPublisher.java
@@ -44,7 +44,7 @@ import com.netscape.certsrv.publish.ILdapPublisher;
/**
* Interface for mapping a X509 certificate to a LDAP entry
- *
+ *
* @version $Revision$, $Date$
*/
public class LdapUserCertPublisher implements ILdapPublisher, IExtendedPluginInfo {
@@ -114,7 +114,7 @@ public class LdapUserCertPublisher implements ILdapPublisher, IExtendedPluginInf
* publish a user certificate
* Adds the cert to the multi-valued certificate attribute as a
* DER encoded binary blob. Does not check if cert already exists.
- *
+ *
* @param conn the LDAP connection
* @param dn dn of the entry to publish the certificate
* @param certObj the certificate object.
@@ -176,7 +176,7 @@ public class LdapUserCertPublisher implements ILdapPublisher, IExtendedPluginInf
return;
}
- // publish
+ // publish
LDAPModification mod = null;
if (deleteCert) {
mod = new LDAPModification(LDAPModification.REPLACE,
diff --git a/base/common/src/com/netscape/cms/publish/publishers/PublisherUtils.java b/base/common/src/com/netscape/cms/publish/publishers/PublisherUtils.java
index af8d283dd..280a0ce97 100644
--- a/base/common/src/com/netscape/cms/publish/publishers/PublisherUtils.java
+++ b/base/common/src/com/netscape/cms/publish/publishers/PublisherUtils.java
@@ -30,7 +30,7 @@ import java.util.Vector;
/**
* Publisher utility class.
- *
+ *
* @version $Revision$, $Date$
*/
public class PublisherUtils {
@@ -105,7 +105,7 @@ public class PublisherUtils {
/**
* strips out double quotes around String parameter
- *
+ *
* @param s the string potentially bracketed with double quotes
* @return string stripped of surrounding double quotes
*/